π World Crumb Policy
Global Framework for Safe, Local-First, Child-Centered Learning Spaces
Version: 1.0
Status: Policy Framework
Scope: Universal
Languages: Multilingual (base: EN/DE)
1. Purpose & Scope
This policy defines the universal principles and operational boundaries for any implementation of child-centered, technology-assisted learning spaces worldwide.
Applies to:
- Schools
- NGOs
- Community centers
- Refugee camps
- Rural education hubs
- Low-resource environments
- Maker spaces
- Research institutions
Does NOT apply to:
- Commercial edtech platforms
- Surveillance systems
- Data-harvesting applications
- Cloud-only services
- Gamified learning apps
- Performance measurement tools
2. Universal Principles (Non-Negotiable)
Every implementation, in every context, must adhere to:
2.1 Child First
Priority Order:
1. Child safety & wellbeing
2. System integrity
3. Adult convenience
Decision Test:
"Does this protect the child first,
the system second,
and the adult last?"
If YES β Proceed
If NO β Stop
2.2 Local First
Operation:
β
Offline by default
β
Local network only
β
No cloud dependency
β
Community-controlled
β No internet requirement
β No central servers
β No external dependencies
2.3 No Identity
Zero Data Collection:
β No names
β No emails
β No biometrics
β No photos
β No audio recordings
β No permanent accounts
β No tracking
Temporary Only:
β
24h session tokens
β
Local configurations
β
Technical logs (anonymous)
2.4 Structural Safety
Safety Through:
β
Hardware boundaries (FPGA, VLAN)
β
Network isolation
β
Physical supervision
β
Transparent operation
β
Reversible states
NOT Through:
β User restrictions
β Data collection
β Surveillance
β Performance tracking
2.5 Right to Complexity
Children Have Right To:
β
Direct system access
β
Admin rights (in safe structure)
β
Source code visibility
β
Low-level exploration
β
Error without shame
β
Slow learning pace
β
Exploration without measurement
Children Do NOT Need:
β Simplified systems
β "Child-friendly" hiding
β Protection from complexity
β Performance pressure
β Gamification
2.6 Adult Presence
Required:
β
Trained adult always present
β
Support, not control
β
Observation, not judgment
β
Available, not intrusive
Forbidden:
β Unsupervised sessions
β Performance pressure
β Punishment for errors
β Comparison between children
2.7 Transparency
Must Be Visible:
β
How system works
β
What data exists (minimal)
β
Why rules exist
β
How to reset/undo
β
Where information goes
Must NOT Be Hidden:
β System operation
β Data processing
β Decision logic
β Safety boundaries
2.8 Reversibility
Everything Must Be:
β
Undoable
β
Resettable
β
Recoverable
β
Non-permanent
No Irreversible:
β Data storage
β Account creation
β Identity linking
β Permanent consequences
3. Absolute Red Lines (STOP Conditions)
If ANY of these are present β STOP DEPLOYMENT IMMEDIATELY
β Long-term user identifiers
β Permanent accounts
β Cloud-only operation
β Internet dependency
β Personal data collection
β Biometric storage
β Photo/video retention
β Performance ranking systems
β Leaderboards or timers
β Adult-only control (no child agency)
β Hidden operations
β Unsupervised interaction
β Dual-use capabilities
β Surveillance features
β Ideology injection
β Political messaging
β Religious evangelism
β Commercial advertising
4. Required Green Lights (GO Conditions)
All must be present for deployment:
β
Local-only operation
β
Hardware-enforced limits
β
No personal data
β
Temporary access only (β€24h)
β
Clear safety boundaries
β
Adult supervision always present
β
Transparent logs
β
Zero gamification
β
Curiosity-driven learning
β
Cultural neutrality
β
Everything reversible
β
Open documentation
β
Community ownership possible
5. Context Adaptation Matrix
5.1 High-Infrastructure Contexts (EU, North America, etc.)
Requirements:
β
GDPR/COPPA compliance
β
VLAN isolation
β
DSFA (Data Protection Impact Assessment)
β
Formal safeguarding policies
β
Background checks for adults
Optional:
β Integration with school systems
β Parental consent mechanisms
β Regular audits
5.2 Low-Infrastructure Contexts (Sub-Saharan Africa, Rural Asia, etc.)
Requirements:
β
Offline-first (no internet assumption)
β
Solar/battery operation
β
Low-cost hardware (Raspberry Pi, ESP32)
β
Locally repairable
β
Community training simple
Adaptations:
β Simplified rituals
β Pictorial documentation
β Oral tradition integration
5.3 Conflict/Fragile Zones
Requirements:
β
Zero identity exposure
β
No sensitive data logging
β
Physical safety paramount
β
Rapid deployment/teardown
β
No permanent installations
Critical:
β οΈ No data that could endanger children
β οΈ No tracking of attendance
β οΈ No photography
5.4 Indigenous/Cultural Contexts
Requirements:
β
Community consultation BEFORE entry
β
Respect for local knowledge systems
β
Cultural adaptation allowed
β
Language localization
β
Elder involvement
Forbidden:
β Imposing external values
β Disrupting social structures
β Commercial extraction
5.5 Volunteer-Driven Contexts (Hackerspaces, Community Centers)
Requirements:
β
Low technical complexity
β
Volunteer training < 1 day
β
Self-service documentation
β
No specialized equipment
β
Peer support network
Simplified:
β Reduced feature set OK
β "Good enough" acceptable
β Iteration encouraged
6. Dual-Use Boundaries (Absolute)
Based on 23 years of experience (DroneMasters 2015-2025):
6.1 Forbidden Parallel Activities
β NEVER run education AND security training in same organization
β NEVER teach children X while training adults to defend against X
β NEVER use same technology for civilian AND military purposes
β NEVER combine child education with law enforcement training
6.2 Technology Restrictions
Forbidden Technologies:
β Drones (weaponizable)
β Facial recognition (surveillance)
β Biometric systems (identity exposure)
β Targeting systems
β Dual-use AI (can be weaponized)
β Tracking devices
Allowed Technologies:
β
LEDs (not weaponizable)
β
Microcontrollers (safe, educational)
β
Local servers (no cloud risk)
β
Simple robotics (if clearly educational)
β
Art tools
β
Music instruments
6.3 The Checklist (Before Building)
β Can this technology become a weapon?
If YES β Don't or change technology
β Would military want this technology?
If YES β Dual-use, reconsider
β Can this technology surveil?
If YES β Only if structurally local + safe
β Do we offer "defense" training simultaneously?
If YES β STOP, doesn't work
β Can we honestly explain to children?
If "we build X but it can be used for Y" and Y=killing β Don't
β Can we sleep at night?
If NO β Listen to conscience
β Would we build it after visiting Kigali Memorial?
If NO β Then don't build it at all
7. Pedagogy Requirements
7.1 Learning Philosophy
Must Support:
β
Exploration over performance
β
Curiosity over curriculum
β
Understanding over memorization
β
Process over product
β
Questions over answers
β
Error as data, not failure
Must NOT Include:
β Ranking systems
β Performance metrics
β Time pressure
β Competitive elements
β External rewards
β Punishment for mistakes
7.2 The 8 Rights (Universal)
1. Right to Direct System Access
β See memory, understand internals
2. Right to Admin (in safe structure)
β Root access in isolated container
3. Right to Exploration Without Measurement
β No scores, timers, leaderboards
4. Right to Real Complexity
β Truth, not "child-friendly" hiding
5. Right to Errors (without shame)
β Crash = learning opportunity
6. Right to Source (not just binary)
β Read, modify, understand code
7. Right to Low-Level Access
β Assembly, registers, hardware if desired
8. Right to Slow (without pressure)
β Own pace, no curriculum stress
7.3 Adult Role
Adults Must:
β
Be present (supervision)
β
Observe without judgment
β
Support when asked
β
Explain when needed
β
Ensure physical safety
β
Maintain boundaries
Adults Must NOT:
β Direct learning
β Impose structure
β Create pressure
β Compare children
β Judge performance
β Solve for children
8. Technical Requirements
8.1 Minimum Standards
Required:
β
Offline capability
β
Local network isolation (VLAN)
β
Hardware boundaries (FPGA or equivalent)
β
Reset capability (<60 seconds)
β
Anonymous technical logs only
β
Open documentation
Optional:
β Internet gateway (heavily filtered, logged)
β External updates (manual, audited)
β Cloud backup (encrypted, no identity)
8.2 Safety Architecture
Layers:
1. Hardware (FPGA, VLAN, physical isolation)
2. Network (local only, no WAN)
3. Software (minimal privileges, sandboxed)
4. Process (adult supervision, clear rules)
5. Recovery (full reset always possible)
8.3 Data Minimization
Store ONLY:
β
Temporary session tokens (24h max)
β
Local system configurations
β
Technical logs (IP, timestamp, action)
NEVER Store:
β Names
β Birthdays
β Addresses
β Photos
β Audio
β Biometrics
β Long-term profiles
β Behavioral patterns
9. Deployment Checklist
9.1 Before Deployment (Go/No-Go)
β All 8 Universal Principles adhered to?
β No red lines crossed?
β All green lights present?
β Context-specific requirements met?
β Adult training completed?
β Physical space safe?
β Technical systems tested?
β Emergency procedures documented?
β Community consultation done (if applicable)?
β Dual-use check passed?
9.2 During Operation
Daily:
β Adult supervision present?
β Systems functioning?
β Children safe and engaged?
Weekly:
β Technical logs reviewed (anonymous)?
β Safety incidents logged?
β Community feedback gathered?
Monthly:
β Full system audit?
β Documentation updated?
β Training needs identified?
9.3 Incident Response
If ANY safety concern:
1. Stop activity immediately
2. Ensure children safe
3. Document incident (no personal data)
4. Notify coordinators
5. Review and adapt
6. Transparent communication
10. Verification & Compliance
10.1 Self-Assessment
Every implementation must complete:
- GLOBAL_TEST_MATRIX v0.2 (8 dimensions)
- Wald-Testmatrix v0.1 (if German context)
- Context-specific requirements checklist
10.2 External Audit (Optional)
Recommended for:
- Large-scale deployments
- Vulnerable populations
- Funded programs
- Research contexts
Audit Covers:
β Technical safety
β Child protection
β Data minimization
β Pedagogical alignment
β Cultural appropriateness
10.3 Continuous Improvement
Required:
β
Regular safety reviews
β
Community feedback integration
β
Incident learning
β
Documentation updates
β
Shared learnings with network
11. Governance & Ownership
11.1 Open Source + Boundaries
Open:
β
Fork freely
β
Adapt to context
β
Translate to language
β
Share improvements
β
Create variations
Bounded:
β Cannot remove child protection
β Cannot add data collection
β Cannot add cloud dependency
β Cannot add dual-use features
β Cannot add gamification
11.2 Community Ownership
Every implementation should strive for:
β
Local ownership (not external dependency)
β
Community control (not corporate)
β
Cultural adaptation (not imposition)
β
Knowledge transfer (not vendor lock-in)
β
Sustainability (not aid dependency)
11.3 Network Support
Implementations can:
β
Join global network (optional)
β
Share learnings
β
Get peer support
β
Contribute improvements
β
Remain autonomous
Network provides:
β Documentation
β Training resources
β Peer connections
β Technical support
β Funding guidance
12. Success Definition
A deployment is successful when:
β
Children are safe (zero incidents)
β
Children are curious (engagement high)
β
Children are learning (visible growth)
β
Adults are supporting (not controlling)
β
System is stable (minimal intervention)
β
Community is owning (sustainable)
β
No data is leaking (privacy intact)
β
Boundaries are holding (safety maintained)
Measured by:
- Child safety (zero tolerance for violations)
- Engagement (voluntary return rate)
- Understanding (can explain system)
- System stability (uptime, resets needed)
- Community satisfaction (feedback)
NOT measured by:
- Test scores
- Completion rates
- Performance metrics
- Comparative rankings
- Time on task
13. International Alignment
This policy aligns with and supports:
UNICEF:
β Child-Friendly Spaces
β Digital Public Goods
β Safeguarding Standards
UNESCO:
β Education for Sustainable Development
β Global Citizenship Education
β Digital Literacy
UN Convention on the Rights of the Child:
β Article 3 (Best interests of child)
β Article 16 (Privacy)
β Article 31 (Leisure, play, culture)
GDPR / Data Protection:
β Data minimization
β Purpose limitation
β Storage limitation
β Privacy by design
Humanitarian Standards:
β Sphere Handbook
β INEE Minimum Standards
β Core Humanitarian Standard (CHS)
14. Conclusion
World Crumb Policy defines the universal framework for safe, local-first, child-centered learning spaces.
It is:
- Non-negotiable on safety
- Flexible on implementation
- Universal in principle
- Adaptable in practice
It protects:
- Children first
- Communities second
- Systems third
It enables:
- Local ownership
- Cultural adaptation
- Global collaboration
- Sustainable impact
Version: 1.0
Status: Active Policy Framework
Scope: Universal (all implementations)
Review: Annual or as needed
Contact: [Your contact method]
πππ²
For children. Worldwide. Always.